systems, apparatus, and methods may provide for contextually aware dynamic group formation. In one aspect a connection manager has a contextual location identifier to determine a contextual location based on one or more locations frequented by a device user. A list generator may generate a contextual location group device list of trusted devices within the contextual location group. An identification generator may generate a contextual location group identification to serve as a data sharing token for the trusted devices within the contextual location group.
|
11. A method to facilitate direct peer-to-peer data sharing among devices within a contextual location group comprising:
determining a contextual location based on one or more locations frequented by a device user;
generating a list of trusted devices within a contextual location group; and
generating a contextual location group identification to serve as a data sharing token for the trusted devices within the contextual location group, wherein the data sharing token permits transferring files or other data among the trusted devices on the group device list in a direct peer-to-peer manner without involving an intervening network, and wherein when a device of the trusted devices within the contextual location group is designated as a primary device the device is configured to generate the contextual location group identification based on a frequency that the device is encountered at a plurality of contextual locations.
18. At least one non-transitory computer readable storage medium comprising a set of instructions which, when executed by a computing device, cause the computing device to:
determine a contextual location based on one or more locations frequented by a device user;
generate a list of trusted devices within a contextual location group; and
generate a contextual location group identification to serve as a data sharing token for the trusted devices within the contextual location group, wherein the data sharing token is to permit transferring files or other data among the trusted devices on the group device list in a direct peer-to-peer manner without involving an intervening network, and wherein when a device of the trusted devices within the contextual location group is designated as a primary device the device is configured to generate the contextual location group identification based on a frequency that the device is to be encountered at a plurality of contextual locations.
7. A connection manager apparatus comprising:
a contextual location identifier to determine a contextual location based on one or more locations frequented by a device user;
a list generator to generate a list of trusted devices within a contextual location group; and
an identification generator to generate a contextual location group identification, wherein the contextual location group identification is to serve as a data sharing token for the trusted devices within the contextual location group, wherein the data sharing token is to permit transferring files or other data among the trusted devices on the group device list in a direct peer-to-peer manner without involving an intervening network, and wherein when the connection manager apparatus is designated as a primary device the identification generator is configured to generate the contextual location group identification based on a frequency that the connection manager apparatus is to be encountered at a plurality of contextual locations.
1. A computer platform comprising:
one or more sensors selected from a global positioning system, a gyroscope, an accelerometer, a wireless network sensor, a proximity sensor, or a thermal sensor;
a connection manager to communicate with the one or more sensors, the connection manager including:
a contextual location identifier to identify a contextual location based on one or more locations frequented by a device user;
a list generator to generate a list of trusted devices within a contextual location group; and
an identification generator to generate a contextual location group identification, wherein the contextual group identification is to serve as a data sharing token for the trusted devices within the contextual location group, wherein the data sharing token is to permit transferring files or other data among the trusted devices on the group device list in a direct peer-to-peer manner without involving an intervening network, and wherein when the computer platform is designated as a primary device the identification generator is configured to generate the contextual location group identification based on a frequency that the computer platform is to be encountered at a plurality of contextual locations.
2. The computer platform of
3. The computer platform of
4. The computer platform of
5. The computer platform of
8. The apparatus of
10. The apparatus of
12. The method of
13. The method of
14. The method of
15. The method of
16. The method of
19. The at least one non-transitory computer readable storage medium of
20. The at least one non-transitory computer readable storage medium of
21. The at least one non-transitory computer readable storage medium of
22. The at least one non-transitory computer readable storage medium of
23. The at least one non-transitory computer readable storage medium of
24. The at least one non-transitory computer readable storage medium of
|
Embodiments generally relate to group formation among devices. More particularly, embodiments relate to contextually aware dynamic group formation among devices.
Recently, peer-to-peer sharing among devices, particularly mobile devices, has occurred using various “apps” (applications) where a connection between devices appears to be peer-to-peer but actually goes through an external network and a cloud service. Using an external network potentially invades the privacy of the users by exposing their data to third parties. Further, the use of various apps may “sandbox” the sharing to that particular app. That is, plugins may be required to support the apps. Moreover, additional code may be required to enable the copying of data.
Many situations may arise where it is desirable for a user to share data with one or more other users. For example, a user visiting customers or attending a meeting may wish to share files with a newly formed group of devices. True peer-to-peer file sharing with such groups, however, may currently be cumbersome or involve going through an external network.
The various advantages of the embodiments will become apparent to one skilled in the art by reading the following specification and appended claims, and by referencing the following drawings, in which:
Turning now to
The communication manager apparatus 105 may communicate with a user through a user interface 160. To communicate with other devices, an interdevice communicator 165 is provided. This may be a device using WiFi (e.g. an IEEE 802.11 protocol), a Bluetooth protocol (e.g., Bluetooth Core Specification, Version 3.0, 2009), or any other type of wireless networking device. Data sent to other devices may use the interdevice communicator 165; data may also be received through the interdevice communicator 165.
To manage the platform and to analyze data transfer, a platform manager 145 may be provided. The platform manager 145 may oversee the operations of the connection manager apparatus 105 and may include a content sharing analyzer 147, to be discussed in further detail below.
As an example, a flowchart of an overview method 10 is provided in
In each contextual location, the connection manager apparatus 105 may come into proximity with other devices such as third party devices 180. In block 22, the proximate device log 130 may identify such proximate devices and, in connection with the list generator 125, may generate a list of trusted devices once a device is seen for a prolonged period of time or if a user has validated the third party device. This list is the contextual location group device list of block 22.
Using the center of a cluster, the connection manager apparatus 105 may use the identification generator 120 in block 23 to create a contextual location group identification that may be used as a token to facilitate data sharing with third party devices 180. That is, devices that have been added to the contextual location group device list in illustrated block 22 will receive the location group identification in block 23 that may be used as a token to transfer a file or other data among devices on the group device list in a direct peer-to-peer manner without requiring an intervening network.
A flowchart of a method 300 is provided in
Referring to both
The computer platform 100, assigned as the primary device, may monitor locations that the user visits and the duration of time a user spends at each location. To this end, the sensor 150 including GPS may be employed. In illustrated block 310, the computer platform 100 observes a new location. In block 315 the computer platform 100 examines the location to determine if it should be clustered with a previously-identified location. If it should not be clustered, a new contextual location may be created at block 320. If it should be clustered, the location may be added to a previously-identified contextual location in block 325. For example, a previously-identified contextual location may be “work” and the new location to be clustered is a new conference room at “work” that has not been previously visited by the user. In clustering the new conference room with the previously-identified contextual location of “work,” the user is likely to encounter similar devices that require similar data sharing as the previous devices at the “work” location, making clustering a good choice for this context.
The context may be identified in a variety of ways. For example context may be identified through monitoring objects being shared and their types. From the monitored objects, keywords may be extracted to define the context. This technique may also be augmented by using reverse GPS lookups to online directories.
At illustrated block 330, the computer platform 100 analyzes the importance of the location. Importance may be determined by a number of factors including time spent at the location, frequency of travel to the location, user input, or number of devices encountered at the location. For example, for a typical user, locations that are important are the home/residence and the workplace. Others that are less important might be common places a user visits such as a coffee shop or favorite recreational area. More transient locations or locations visited by the user that are not typical contexts for data sharing (for example, a local gas station) may not be deemed as “important.” If the location is deemed “important,” then a location identification is generated at block 335 by contextual location identification generator 125 of connection manager apparatus 105. As discussed above, this location identification may be used as a token for data sharing among devices in a contextual location group. Note that if a user stops going to a particular location, the context related to that location is aged and may be dropped from a list of contextual sharing groups. The user has access and control, however, over the list of contexts and locations that are being identified through user interface 160. The process of creating a contextual location identification ends at block 340.
A flowchart of a method 400 is provided in
Once a device is seen for a prolonged period of time or for many encounters, it will achieve a threshold trust score at block 430. This score level may be determined automatically or it may be set by the user. When a device is above the trust threshold, the user may be prompted to add the device to the trusted list of devices created by the list generator 125 at block 435. Prompting may occur through any suitable user notification technique, typically through notification through the user interface 160. If the device is approved to be added to the trusted device list, it is added to the list of trusted devices by list generator 125 at block 445. The contextual location identification is then shared with this device to facilitate peer-to-peer data sharing and the process ends at block 450.
As an example of peer-to-peer data sharing, the contextual location identification may be used as a token in a Web Real Time Communication (WebRTC) file sharing process. WebRTC is an API definition drafted by the World Wide Web Consortium (W3C) that supports browser-to-browser applications for voice calling, video chat, and peer-to-peer file sharing without the need for plugins. WebRTC is supported by many browsers and HTML5 (Hyper-Text Mark-Up Language version 5). JavaScript APIs are typically employed by WebRTC. However, WebRTC lacks the contextually-aware dynamic group-forming capabilities of the above embodiments. Note that WebRTC is not the only protocol that may be used for file sharing. Other direct peer-to-peer protocols such as Intel CCF (Common Connectivity Framework) may also be used. Using WebRTC or Intel CCF, computer platform 100 may be capable of proxying connections among devices in a context or even be used as a rendezvous point allowing trusted devices to create peer-to-peer connections if they need to communicate directly without going through computer platform 100.
To further facilitate data sharing, the platform manager 145 of
In another contextual location, the user may define that location manually as a new context and publish the contextual location identification to any device in proximity. For example, at a conference, a user may wish to share files with attendees to the user's presentation. For recurring meetings, the generated contextual location identification may be cached by the devices and re-used, making future connections faster since the discovery phase is omitted.
The processor core 200 is shown including execution logic 250 having a set of execution units 255-1 through 255-N. Some embodiments may include a number of execution units dedicated to specific functions or sets of functions. Other embodiments may include only one execution unit or one execution unit that can perform a particular function. The illustrated execution logic 250 performs the operations specified by code instructions.
After completion of execution of the operations specified by the code instructions, back end logic 260 retires the instructions of the code 213. In one embodiment, the processor core 200 allows out of order execution but requires in order retirement of instructions. Retirement logic 265 may take a variety of forms as known to those of skill in the art (e.g., re-order buffers or the like). In this manner, the processor core 200 is transformed during execution of the code 213, at least in terms of the output generated by the decoder, the hardware registers and tables utilized by the register renaming logic 225, and any registers (not shown) modified by the execution logic 250.
Although not illustrated in
Referring now to
The system 1000 is illustrated as a point-to-point interconnect system, wherein the first processing element 1070 and the second processing element 1080 are coupled via a point-to-point interconnect 1050. It should be understood that any or all of the interconnects illustrated in
As shown in
Each processing element 1070, 1080 may include at least one shared cache 1896a, 1896b (e.g., static random access memory/SRAM). The shared cache 1896a, 1896b may store data (e.g., objects, instructions) that are utilized by one or more components of the processor, such as the cores 1074a, 1074b and 1084a, 1084b, respectively. For example, the shared cache 1896a, 1896b may locally cache data stored in a memory 1032, 1034 for faster access by components of the processor. In one or more embodiments, the shared cache 1896a, 1896b may include one or more mid-level caches, such as level 2 (L2), level 3 (L3), level 4 (L4), or other levels of cache, a last level cache (LLC), and/or combinations thereof.
While shown with only two processing elements 1070, 1080, it is to be understood that the scope of the embodiments are not so limited. In other embodiments, one or more additional processing elements may be present in a given processor. Alternatively, one or more of processing elements 1070, 1080 may be an element other than a processor, such as an accelerator or a field programmable gate array. For example, additional processing element(s) may include additional processors(s) that are the same as a first processor 1070, additional processor(s) that are heterogeneous or asymmetric to processor a first processor 1070, accelerators (such as, e.g., graphics accelerators or digital signal processing (DSP) units), field programmable gate arrays, or any other processing element. There can be a variety of differences between the processing elements 1070, 1080 in terms of a spectrum of metrics of merit including architectural, micro architectural, thermal, power consumption characteristics, and the like. These differences may effectively manifest themselves as asymmetry and heterogeneity amongst the processing elements 1070, 1080. For at least one embodiment, the various processing elements 1070, 1080 may reside in the same die package.
The first processing element 1070 may further include memory controller logic (MC) 1072 and point-to-point (P-P) interfaces 1076 and 1078. Similarly, the second processing element 1080 may include a MC 1082 and P-P interfaces 1086 and 1088. As shown in
The first processing element 1070 and the second processing element 1080 may be coupled to an I/O subsystem 1090 via P-P interconnects 1076 and 1086, respectively. As shown in
In turn, I/O subsystem 1090 may be coupled to a first bus 1016 via an interface 1096. In one embodiment, the first bus 1016 may be a Peripheral Component Interconnect (PCI) bus, or a bus such as a PCI Express bus or another third generation I/O interconnect bus, although the scope of the embodiments are not so limited.
As shown in
Note that other embodiments are contemplated. For example, instead of the point-to-point architecture of
Example 1 may include a computer platform to facilitate direct peer-to-peer sharing among devices including one or more sensors selected from a global positioning system, a gyroscope, an accelerometer, a wireless network sensor, or a thermal sensor, a connection manager to communicate with the one or more sensors, the connection manager including a contextual location identifier to identify a contextual location based on one or more locations frequented by a device user, a list generator to generate a contextual group device list of trusted devices within the contextual location group, and an identification generator to generate a contextual location group identification, wherein the contextual group identification is to serve as a data sharing token for the trusted devices within the contextual location group.
Example 2 may include the computer platform of example 1, further including a platform manager to communicate with the connection manager and the one or more sensors.
Example 3 may include the computer platform of examples 1 or 2, wherein the platform manager further includes a content sharing analyzer to analyze data shared with peer devices by the connection manager.
Example 4 may include the computer platform of examples 1 or 2, further including a user interface to communicate with the device manager and with the connection manager.
Example 5 may include the computer platform of examples 1 or 2, further including data storage to store data to be shared with peer devices.
Example 6 may include the computer platform of examples 1 or 2, further including an inter-device communicator.
Example 7 may include a connection manager apparatus to facilitate direct peer-to-peer data sharing among devices within a contextual location group including a contextual location identifier to determine a contextual location based on one or more locations frequented by a device user a list generator to generate a contextual location group device list of trusted devices within the contextual location group, and an identification generator to generate a contextual location group identification, wherein the contextual location group identification is to serve as a data sharing token for the trusted devices within the contextual location group.
Example 8 may include the apparatus of example 7, further including a platform manager to communicate with the connection manager.
Example 9 may include the apparatus of examples 7 or 8, wherein the platform manager further includes a content sharing analyzer to analyze data shared with peer devices by the connection manager.
Example 10 may include the apparatus of examples 7 or 8, further including a proximate device log to track proximate devices within a specified contextual location.
Example 11 may include the apparatus of examples 7 or 8, further including a trust score generator.
Example 12 may include the apparatus of examples 7 or 8, further including a data sharing manager within the connection manager to communicate with data storage.
Example 13 may include a method to facilitate direct peer-to-peer data sharing among devices within a contextual location group including determining a contextual location based on one or more locations frequented by a device user, generating a contextual location group device list of trusted devices within the contextual location group, and generating a contextual location group identification to serve as a data sharing token for the trusted devices within the contextual location group.
Example 14 may include the method of example 13, further including monitoring locations frequented by the device user using a sensor to determine the contextual location group.
Example 15 may include the method of example 14, further including monitoring the presence of other devices within the contextual location group.
Example 16 may include the method of example 15, further including determining a trust score based on the frequency of occurrence of another device within the contextual location group.
Example 17 may include the method of example 16, further including prompting the device user to add a device to the contextual location group based on the trust score.
Example 18 may include the method of examples 13 or 14, further including directly sharing data with another device in the contextual location group.
Example 19 may include the method of example 18 wherein the data sharing uses Web Real Time Communication (WebRTC).
Example 20 may include at least one computer readable storage medium comprising a set of instructions which, when executed by a computing device, cause the computing device to determine a contextual location based on one or more locations frequented by a device user generate a contextual location group device list of trusted devices within the contextual location group, and generate a contextual location group identification to serve as a data sharing token for the trusted devices within the contextual location group.
Example 21 may include the at least one computer readable storage medium of example 20, wherein the instructions, when executed, cause the computing device to monitor locations frequented by a device user to determine the contextual location group.
Example 22 may include the at least one computer readable storage medium of example 21, wherein the instructions, when executed, cause the computing device to monitor the presence of other devices within the contextual location group.
Example 23 may include the at least one computer readable storage medium of example 22, wherein the instructions, when executed, cause the computing device to determine a trust score based on the frequency of occurrence of another device within the contextual location group.
Example 24 may include the at least one computer readable storage medium of example 23, wherein the instructions, when executed, cause the computing device to prompt the device user to add a device to the contextual location group based on the trust score.
Example 25 may include the at least one computer readable storage medium of examples 20 or 21, wherein the instructions, when executed, cause the computing device to directly share data with another device in the contextual location group.
Example 26 may include the at least one computer readable storage medium of example 25 wherein data sharing uses Web Real Time Communication (WebRTC).
Example 27 may include a connection manager apparatus to facilitate direct peer-to-peer data sharing among devices within a contextual location group including means for determining a contextual location based on one or more locations frequented by a device user, means for generating a contextual location group device list of trusted devices within the contextual location group, and means for generating a contextual location group identification to serve as a data sharing token for the trusted devices within the contextual location group.
Example 28 may include the apparatus of example 27, further including means for monitoring locations frequented by the device user using a sensor to determine the contextual location group.
Example 29 may include the apparatus of example 28, further including means for monitoring the presence of other devices within the contextual location group.
Example 30 may include the apparatus of example 29, further including means for determining a trust score based on the frequency of occurrence of another device within the contextual location group.
Example 31 may include the apparatus of example 30, further including means for prompting the device user to add a device to the contextual location group based on the trust score.
Example 32 may include the apparatus of examples 27 or 28, further including means for directly sharing data with another device in the contextual location group.
Example 33 may include the apparatus of example 32 wherein the data sharing uses Web Real Time Communication (WebRTC).
Thus, embodiments described above permit contextually aware dynamic group formation that facilitates data sharing in a direct peer-to-peer manner with trusted devices. By observing locations, creating contextual location identifications, and creating trusted device lists, groups are formed in an intuitive manner with minimal user intervention, creating a more seamless data-sharing experience that mimics natural patterns of human contact.
Embodiments are applicable for use with all types of semiconductor integrated circuit (“IC”) chips. Examples of these IC chips include but are not limited to processors, controllers, chipset components, programmable logic arrays (PLAs), memory chips, network chips, systems on chip (SoCs), SSD/NAND controller ASICs, and the like. In addition, in some of the drawings, signal conductor lines are represented with lines. Some may be different, to indicate more constituent signal paths, have a number label, to indicate a number of constituent signal paths, and/or have arrows at one or more ends, to indicate primary information flow direction. This, however, should not be construed in a limiting manner. Rather, such added detail may be used in connection with one or more exemplary embodiments to facilitate easier understanding of a circuit. Any represented signal lines, whether or not having additional information, may actually comprise one or more signals that may travel in multiple directions and may be implemented with any suitable type of signal scheme, e.g., digital or analog lines implemented with differential pairs, optical fiber lines, and/or single-ended lines.
Example sizes/models/values/ranges may have been given, although embodiments are not limited to the same. As manufacturing techniques (e.g., photolithography) mature over time, it is expected that devices of smaller size could be manufactured. In addition, well known power/ground connections to IC chips and other components may or may not be shown within the figures, for simplicity of illustration and discussion, and so as not to obscure certain aspects of the embodiments. Further, arrangements may be shown in block diagram form in order to avoid obscuring embodiments, and also in view of the fact that specifics with respect to implementation of such block diagram arrangements are highly dependent upon the platform within which the embodiment is to be implemented, i.e., such specifics should be well within purview of one skilled in the art. Where specific details (e.g., circuits) are set forth in order to describe example embodiments, it should be apparent to one skilled in the art that embodiments can be practiced without, or with variation of, these specific details. The description is thus to be regarded as illustrative instead of limiting.
The term “coupled” may be used herein to refer to any type of relationship, direct or indirect, between the components in question, and may apply to electrical, mechanical, fluid, optical, electromagnetic, electromechanical or other connections. In addition, the terms “first”, “second”, etc. may be used herein only to facilitate discussion, and carry no particular temporal or chronological significance unless otherwise indicated.
As used in this application and in the claims, a list of items joined by the term “one or more of” may mean any combination of the listed terms. For example, the phrases “one or more of A, B or C” may mean A, B, C; A and B; A and C; B and C; or A, B and C.
Those skilled in the art will appreciate from the foregoing description that the broad techniques of the embodiments can be implemented in a variety of forms. Therefore, while the embodiments have been described in connection with particular examples thereof, the true scope of the embodiments should not be so limited since other modifications will become apparent to the skilled practitioner upon a study of the drawings, specification, and following claims.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7644144, | Dec 21 2001 | Microsoft Technology Licensing, LLC | Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration |
7680959, | Jul 11 2006 | Concert Technology Corporation | P2P network for providing real time media recommendations |
7783777, | Sep 09 2003 | Oracle America, Inc | Peer-to-peer content sharing/distribution networks |
8621656, | Jul 06 2010 | RPX Corporation | Method and apparatus for selecting a security policy |
20090063419, | |||
20120011559, | |||
20120264446, | |||
20130104221, | |||
20130304898, | |||
20140324979, | |||
WO2014123738, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 17 2014 | Intel Corporation | (assignment on the face of the patent) | / | |||
Feb 26 2015 | WOUHAYBI, RITA H | Intel Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 036790 | /0962 |
Date | Maintenance Fee Events |
Aug 09 2021 | REM: Maintenance Fee Reminder Mailed. |
Jan 24 2022 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Dec 19 2020 | 4 years fee payment window open |
Jun 19 2021 | 6 months grace period start (w surcharge) |
Dec 19 2021 | patent expiry (for year 4) |
Dec 19 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 19 2024 | 8 years fee payment window open |
Jun 19 2025 | 6 months grace period start (w surcharge) |
Dec 19 2025 | patent expiry (for year 8) |
Dec 19 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 19 2028 | 12 years fee payment window open |
Jun 19 2029 | 6 months grace period start (w surcharge) |
Dec 19 2029 | patent expiry (for year 12) |
Dec 19 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |